Blame SOURCES/nss-fips-disable-tls13.patch

c70942
diff --git a/lib/ssl/sslsock.c b/lib/ssl/sslsock.c
c70942
--- a/lib/ssl/sslsock.c
c70942
+++ b/lib/ssl/sslsock.c
c70942
@@ -2382,16 +2382,26 @@ ssl3_CreateOverlapWithPolicy(SSLProtocol
c70942
     rv = ssl3_GetEffectiveVersionPolicy(protocolVariant,
c70942
                                         &effectivePolicyBoundary);
c70942
     if (rv == SECFailure) {
c70942
         /* SECFailure means internal failure or invalid configuration. */
c70942
         overlap->min = overlap->max = SSL_LIBRARY_VERSION_NONE;
c70942
         return SECFailure;
c70942
     }
c70942
 
c70942
+    /* TODO: TLSv1.3 doesn't work yet under FIPS mode */
c70942
+    if (PK11_IsFIPS()) {
c70942
+        if (effectivePolicyBoundary.min >= SSL_LIBRARY_VERSION_TLS_1_3) {
c70942
+            effectivePolicyBoundary.min = SSL_LIBRARY_VERSION_TLS_1_2;
c70942
+        }
c70942
+        if (effectivePolicyBoundary.max >= SSL_LIBRARY_VERSION_TLS_1_3) {
c70942
+            effectivePolicyBoundary.max = SSL_LIBRARY_VERSION_TLS_1_2;
c70942
+        }
c70942
+    }
c70942
+
c70942
     vrange.min = PR_MAX(input->min, effectivePolicyBoundary.min);
c70942
     vrange.max = PR_MIN(input->max, effectivePolicyBoundary.max);
c70942
 
c70942
     if (vrange.max < vrange.min) {
c70942
         /* there was no overlap, turn off range altogether */
c70942
         overlap->min = overlap->max = SSL_LIBRARY_VERSION_NONE;
c70942
         return SECFailure;
c70942
     }